Information Technology Risk Analysis and Cyber Security Policy Part 2

 

In the second portion of this assessment, you create an organizational cyber-security policy using the information that was identified in the risk analysis paper.

Prompt

You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the work place that pertain to social media, email, and privacy.

Specifically the following critical elements must be addressed:

  1. Compose an organizational security policy that protects the confidentiality, integrity, and availability of the organization’s data.
  2. Evaluate the current U.S. cyberlaws; state statutes; and criminal, civil, private, and public laws and compare them with the organizational security policy to ensure compliance.
  3. Assess the network cyber-security policy to determine if the policy is able to minimize risks and vulnerabilities.
  4. Develop security policy sections that identify acceptable use for users pertaining to privacy, social media, email usage, and internet usage in the workplace.

What to Submit

Your paper must be submitted as a three- to five-page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

NB.

See attached part 1 as an additional resources.

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!